SAP Knowledge Base Article - Preview

2548566 - Stack trace in _dsi_exec_send_cmd in Replication Server 15.7 - SRS

Symptom

  • SAP Replication Server (SRS)
  • DSI EXEC infected with signal 11
  • The STACK TRACE contains the following modules:

       dbg_dump_stack
       exc__appDumpStack
       exc_terminate
       linux_catch_signal
       /lib64/libpthread.so.0
       unknown dynamic function
       _dsi_exec
       dsi__ExecThread
       _dsi_exec_send_cmd
      
    dsi__seqInternalCheck
      
    dsi__seqSubmitCheck
      
    dsi__seqCheckSequence
      
    _dsi_exec
      
    _dsi_qm_exec_cmd
      
    dsie__GenerateSQL ()
       dsie__ProcessGroup ()
       dsie__main ()
       dsie__wrap ()
       srv__start_function ()
       unknown dynamic function
       unknown dynamic function


Read more...

Environment

  • SAP Replication Server (SRS) 15.7/P (GA)
  • Linux on x86_64 64bit

 

Product

SAP Replication Server 15.7

Keywords

KBA , BC-SYB-REP , Sybase Replication Server (standalone) , Problem

About this page

This is a preview of a SAP Knowledge Base Article. Click more to access the full version on SAP for Me (Login required).

Search for additional results

Visit SAP Support Portal's SAP Notes and KBA Search.